Ransomware is almost impossible to remove and, if I’m honest, you’re unlikely to catch a break and get your data back. However things might have just gotten that little bit easier, that is if you find yourself under the cosh of TeslaCrypt because ESET have just made a decryptor.

The face of malware has changed over recent years and it’s safe to say that it’s become an industry like any other. Your data, and it’s importance to you, has a value and it’s one that people are only to keen to capitalise on. In this guide I’ll show you how to use a built in feature of Windows Server to nail down your network.

The Petya malware changed the ransomware scene in that, instead of encrypting all your files, it just encrypts the boot records and file tables of you hard drive making it super fast. Now, one man had enough and has managed to crack the encryption used by Petya.

In a previous post I’ve been looking at how to use file screening to help block CryptoLocker. File screening is a great feature of Windows Server 2012 but the set up can be a pain. With this in mind this is a handy script which will make all the configuration changes for you.

Those of you working in the educational sector will now that Smoothwall devices are pretty much ubiquitous and you’ll be familiar with their web filtering and blocking features. In the just-released Framlington software update Smoothwall are putting in place the building blocks to take eSafety reporting to the next level.